4 IntroductionRéseau de capteurs composé d’un grand nombre de noeuds capteurs,which are densely deployed either inside the phenomenon or very close to it.The position of sensor nodes need not be engineered or pre-determined.sensor network protocols and algorithms must possess self-organizing capabilities.

5 IntroductionThe differences between sensor networks and ad hoc networks are outlined below:The number of sensor nodes in a sensor network is much more than the nodes in an ad hoc network.Sensor nodes are densely deployed.Sensor nodes are prone to failures.The topology of a sensor network changes very frequently.

6 IntroductionThe differences between sensor networks and ad hoc networks are outlined below:Sensor nodes mainly use broadcast communication paradigm whereas most ad hoc networks are based on point-to-point communications.Sensor nodes are limited in power, computational capacities, and memory.Sensor nodes may not have global ID because of the large amount of overhead and large number of sensors.

8 Sensor networks communication architectureEach of these scattered sensor nodes has the capabilities to collect data and route data back to the sinkThe sensor nodes are usually scattered in a sensor fieldThe sink may communicate with the task manager node via Internet or Satellite.

10 Fault tolerance Why fails?Lack of power, physical damage, or environmental interferenceThe reliability Rk(t) of a sensor node is modeled using the Poisson distribution to capture the probability of not having a failure within the time interval (0, t):where λk and t are the failure rate of sensor node k and the time period, respectively.

11 ScalabilityThe number of sensor nodes deployed may be on the order of hundreds , thousands or even millions.The density can be calculated asN is the number of scattered sensor nodes in region A;R is the radio transmission range.The number of nodes in a region can be used to indicate the node density.

12 Production costsSince the sensor networks consist of a large number of sensor nodes, the cost of a single node is very important to justify the overall cost of the networks.The cost of a sensor node should be much less than 1$ in order for the sensor network to be feasible

13 Hardware constraints A sensor node is made up of four basic componentsa sensing unitusually composed of two subunits: sensors and analog to digital converters (ADCs).processing unit,Manages the procedures that make the sensor node collaborate with the other nodes to carry out the assigned sensing tasks.A transceiver unitConnects the node to the network.Power units (the most important unit)

15 Hardware constraints Location finding system. mobilizerMost of the sensor network routing techniques and sensing tasks require the knowledge of location with high accuracy.mobilizerMay be needed to move sensor nodes when it is required to carry out the assigned tasks.

17 Sensor network topologyPre-deployment and deployment phaseSensor nodes can be either thrown in mass or placed one by one in the sensor field.Post-deployment phaseSensor network topologies are prone to frequent changes after deployment.Re-deployment of additional nodes phaseAddition of new nodes poses a need to re-organize the network.

18 Environment Sensor nodes may be working in busy intersections,in the interior of a large machinery,at the bottom of an ocean,inside a twister,in a battlefield beyond the enemy lines,in a home or a large building,

19 Transmission media Industrial, scientific and medical (ISM) bandsoffer license-free communication in most countries.Infraredlicense-free and robust to interferencerequirement of a line of sight between sender and receiver.

20 Power consumptionOnly be equipped with limited power source(<0.5 Ah 1.2V)Node lifetime strong dependent on battery lifetimePower consumption can be divided into three domains:sensing, communication, and data processing.

23 Management PlanesThese management planes make sensor nodes work together in a power efficient way, route data in a mobile sensor network, and share resources between sensor nodes.Power management planemanages how a sensor node uses its power.For example, the sensor node may turn off its receiver after receiving a message.When the power level of the sensor node is low, the sensor node broadcasts to its neighbors that it is low in power and cannot participate in routing messages.

24 Management Planes Mobility management plane Task management planedetects and registers the movement of sensor nodesSo a route back to the user is always maintainedthe sensor nodes can keep track of who are their neighbor sensor nodes.Task management planeBalances and schedules the sensing tasks given to a specific region.Not all sensor nodes in that region are required to perform the sensing task at the same time.

29 Medium access control Two goals:Creation of the network infrastructureFairly and efficiently share communication resources between sensor nodesWhy existing MAC protocol can’t be used?The primary goal of the existing MAC protocol is the provision of high QoS and bandwidth efficiency

30 MAC for sensor networksMAC protocol for sensor network must have built-in power conservation, mobility management and failure recovery strategiesA variant of TDMA, random medium access, constant listening times and adaptive rate control schemes can help achieve energy efficiency

31 Some MAC protocols proposed for sensor networkSMACS and EAR algorithmCSMA based medium accessHybrid TDMA/FDMA based

32 SMACS and the EAR algorithmThe SMACS protocol achieves network start-up and link-layer organizationThe neighbor discovery and channel assignment phases are combined.A communication link consists of a pair of time slots operating at a randomly chosen, but fixed frequency.Power conservation is achieved by using a random wake-up schedule during the connection phase and by turning the radio off during idle time slots.

33 SMACS and the EAR algorithmthe EAR algorithm enables seamless connection of mobile nodesoffer continuous service to the mobile nodes under both mobile and stationary conditions.

35 CSMA based medium accessadaptive transmission rate control (ARC)achieves medium access fairness by balancing the rates of originating and route-through trafficThe ARC controls the data origination rate of a node in order to allow the route-through traffic to propagate.route-through traffic is preferred over the originating trafficlinear increase and multiplicative decrease approachSince dropping route-through traffic is costlier ,the associated penalty is lesser

36 Hybrid TDMA/FDMA basedCentrally controlled MAC schemeThe system is made up of energy constrained sensor nodes that communicate to a single, nearby, high powered base station (<10 m).While a pure TDMA scheme dedicates the full bandwidth to a single sensor node, a pure FDMA scheme allocates minimum signal bandwidth per node.time synchronization costs.

37 Power saving modes of operationturn the transceiver off when it is not required.Not exactlyThere can be a number of such useful modes of operation for the wireless sensor nodedepending on the number of states of the micro-processor, memory, A/D convertor and the transceiver.

38 Error control Two important modes of error controlforward error correction (FEC)If the associated processing power is greater than the coding gain, then the whole process in energy inefficiency and the system is better off without coding.automatic repeat request (ARQ)Both largely unexplored in sensor networks

39 Data-link Layer Open research issues MAC for mobile sensor networkDetermination of lower bounds on the energy required for sensor network self-organizationError control coding schemesPower-saving modes of operation

40 Network layerThe networking layer of sensor networks is usually designed according to the following principles:Power efficiency is always an important consideration.Sensor networks are mostly data centric.Data aggregation is useful only when it does not hinder the collaborative effort of the sensor nodes.An ideal sensor network has attribute-based addressing and location awareness.

41 Power efficiency Node T is the source node that senses the phenomena.Route 3:Sink-D-T, total PA=3, total α=4,Route 1:Sink-A-B-T, total PA=4, total α=3,Node T is the source node that senses the phenomena.PA is the available powerα is the energy required to transmit a data packet through the related link.Route 4:Sink-E-F-T, total PA=5, total α=6Route 2:Sink-A-B-C-T, total PA=6, total α=6,

43 Data-centric RoutingInterest dissemination is performed to assign the sensing tasks to the sensor nodes.Two approaches used for interest dissemination:Sinks broadcast the interestSensor nodes broadcast an advertisement for the available data and wait for a request from the interested sinks.

44 Data-centric Routing Requires attribute-based namingQuerying an attribute of the phenomenon, rather than querying an individual node.Ex: “the areas where the temperature is over 70°F” is a more common query than “the temperature read by a certain node”

45 Data aggregationA technique used to solve the implosion and overlap problems in data-centric routingData coming from multiple sensor nodes with the same attribute of phenomenon are aggregated

47 Data aggregation - continuecan be perceived as a set of automated methods of combining the data the comes from many sensor nodes into a set of meaningful informationWith this respect, data aggregation is known as data fusion

48 Internetworking Sink nodes can be used as a gateway to other networkCreate a backbone by connecting sink nodes together and make it access other network via a gateway

50 Small minimum energy communication network (SMECN)Use small subgraph to communicationThe energy required to transmit data from node u to all its neighbors in subgraph G is less than the energy required to transmit to all its neighbors in graph G’G’GuvMECNSMECN

51 FloodingEach node receiving a data or management packet repeats it by broadcastingDoes not require costly topology maintenance and complex route discovery algorithms.Implosion: a situation where duplicated messages are sent to the same node.Overlap: If two nodes share the same obserying region, both of them may sense the same stimuli at the same time. As a result, neighbor nodes receive duplicated messages.Resource blindness: flooding does not take into account the available energy resources.

52 Gossiping A derivation of floodingNodes send the incoming packets to a randomly selected neighbor.Avoids the implosion problemIt takes a long time to propagate the message to all sensor nodes.

53 Sensor protocols for information via negotiation (SPIN):Designed to address the deficiencies of classic flooding by negotiation and resource adaptation.sending data that describe the sensor data instead of sending the whole dataAs a result, the sensor nodes in the entire sensor network that are interested in the data will get a copy. Note that SPIN is based on data-centric routing.

54 Sequential assignment routing (SAR)sinkSequential assignment routing (SAR)A set of algorithms, which perform organization, management and mobility management operations in sensor networksCreates multiple trees where the root of each tree is one hop neighbor from the sinkMost nodes belong to multiple trees, allows a sensor node to choose a tree to relay its information back to the sink.select a tree for data to be routed back to the sink according to the energy resources and additive QoS metric

55 Low-energy adaptive clustering hierarchy (LEACH)Randomly select sensor nodes as cluster-heads, so the high energy dissipation in communicating with the base station is spread to all sensor nodes in the sensor network.Set-up phaseeach sensor node chooses a random number between 0 and 1If this random number is less than the threshold T(n), the sensor node is a cluster-head.G , the set of nodes that have not being selected as a cluster-head in the last 1/P rounds.P,the desired percentage to become a cluster-head;r,the current round

56 Set-up phase (cont’d)The cluster-heads advertise to all sensor nodes in the networkThe sensor nodes inform the appropriate cluster-heads that they will be a member of the cluster. (base on signal strength)Afterwards, the cluster-heads assign the time on which the sensor nodes can send data to the cluster-heads based on a TDMA approach.

57 After a certain period of time spent on the steady phase, the networksteady phase (cont’d)the sensor nodes can begin sensing and transmitting data to the cluster-heads.The cluster-heads also aggregate data from the nodes in their cluster before sending these data to the base station.After a certain period of time spent on the steady phase, the networkgoes into the set-up phase again andenters into another round of selecting the cluster-heads.

58 the sink sends out interest to sensorsDirected DiffusionAs the interest is propagated throughout the sensor network, the gradients from the source back to the sink are set upthe sink sends out interest to sensorsWhen the source has data for the interest, the source sends the data along the interest’s gradient path

59 Network layer Open research issuesImproved or new protocols to address higher topology changes and higher scalability.

60 Transport layerThe transport layer is needed when the system is planned to be accessed through Internet or other external networks.Not any scheme related to the transport layer of a sensor network has been proposed in literature.

61 Transport layerAn approach such as TCP splitting may be needed to make sensor networks interact with other networks such as Internet.?TCP/UDP

62 Transport layer Open research issuesHardware constraints such as limited power and memory. Each sensor node cannot store large amounts of data like a server in the internet.Acknowledgments are too costly.may be needed where UDP-type protocols are used in the sensor network and TCP/UDP protocols in the internet or satellite network.

64 Sensor management protocol (SMP)SMP is a management protocol that provides the software operations needed to perform the following administrative tasks:introducing the rules related to data aggregation, attribute-based naming and clustering to the sensor nodes,exchanging data related to the location finding algorithms,time synchronization of the sensor nodes

65 Sensor management protocol (SMP)moving sensor nodes,turning sensor nodes on and off,querying the sensor network configuration and the status of nodes, and re-configuring the sensor network,authentication, key distribution and security in data communications.

66 Task assignment and data advertisement protocol (TADAP)Users send their interest to a sensor node, a subset of the nodes or whole network.This interest may be about a certain attribute of the phenomenon or a triggering event.Another approach is the advertisement of available data in which the sensor nodes advertise the available data to the users

68 Application layer Open research issuesAlthough SQTL is proposed, other application layer protocols still need to be developed to pride a greater level of servicesResearch developments should also focus on TADAP and SQDDP

69 ConclusionIn the future, this wide range of application areas will make sensor networks an integral part of our lives.However, realization of sensor networks needs to satisfy the constraints introduced by factors such as fault tolerance, scalability, hardware, topology change, environment and power consumption.Many researchers are currently engaged in developing the technologies needed for different layers of the sensor networks protocol stack